Constructive side-channel analysis and secure design : 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised selected papers /
Constructive side-channel analysis and secure design : 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised selected papers /
COSADE 2017
Sylvain Guilley (Ed.).
- 1 online resource : illustrations
- Lecture notes in computer science ; 10348 LNCS sublibrary. SL 4, Security and cryptology .
- Lecture notes in computer science ; 10348. LNCS sublibrary. SL 4, Security and cryptology. .
Includes index.
Does Coupling Affect the Security of Masked Implementations? / Thomas De Cnudde, Begül Bilgin, Benedikt Gierlichs, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen -- Scaling Trends for Dual-Rail Logic Styles Against Side-Channel Attacks : A Case-Study / Kashif Nawaz, Dinal Kamel, François-Xavier Standaert, Denis Flandre -- Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks / Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht -- Toward More Efficient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation / Rei Ueno, Naofumi Homma, Takafumi Aoki -- Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors / Jeremy Dubeuf, David Hely, Vincent Beroulle -- SafeDRP : Yet Another Way Toward Power-Equalized Designs in FPGA / Maik Ender, Alexander Wild, Amir Moradi -- On the Construction of Side-Channel Attack Resilient S-boxes / Liran Lerman, Nikita Veshchikov, Stjepan Picek, Olivier Markowitch -- Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices / Yoo-Seung Won, Dong-Guk Han -- Side-Channel Analysis of Keymill / Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Florian Mendel -- On the Easiness of Turning Higher-Order Leakages into First-Order / Thorben Moos, Amir Moradi -- Side-Channel Attacks Against the Human Brain : The PIN Code Case Study / Joseph Lange, Clément Massart, André Mouraux, Francois-Xavier Standaert -- Impacts of Technology Trends on Physical Attacks? / Philippe Maurine, Sylvain Guilley -- Low-Cost Setup for Localized Semi-invasive Optical Fault Injection Attacks / Oscar M. Guillen, Michael Gruber, Fabrizio De Santis -- DFA on LS-Designs with a Practical Implementation on SCREAM / Benjamin Lac, Anne Canteaut, Jacques Fournier, Renaud Sirdey -- Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors / Manami Suzuki, Rei Ueno, Naofumi Homma, Takafumi Aoki -- Getting the Most Out of Leakage Detection / Santos Merino del Pozo, François-Xavier Standaert -- Mind the Gap : Towards Secure 1st-Order Masking in Software / Kostas Papagiannopoulos, Nikita Veshchikov.
This book constitutes revised selected papers from the 8th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, held in Paris, France, in April 2017. The 17 papers presented in this volume were carefully reviewed and selected from numerous submissions. They were organized in topical sections named: Side-Channel Attacks and Technological Effects; Side-Channel Countermeasures; Algorithmic Aspects in Side-Channel Attacks; Side-Channel Attacks; Fault Attacks; Embedded Security; and Side-Channel Tools.
9783319646473 3319646478
10.1007/978-3-319-64647-3 doi
com.springer.onix.9783319646473 Springer Nature
GBB8N8190 bnb
019166611 Uk
Data encryption (Computer science)--Congresses.
Computer security--Congresses.
Chiffrement (Informatique)--Congrès.
Sécurité informatique--Congrès.
Coding theory & cryptology.
Information architecture.
Systems analysis & design.
Discrete mathematics.
Algorithms & data structures.
Computer security.
Computers--Security--General.
Business & Economics--Information Management.
Computers--Information Technology.
Computers--Data Processing.
Computers--Systems Architecture--General.
Computer architecture
Computer science
Computer science--Mathematics
Computer security
Data encryption (Computer science)
Management information systems
Microprogramming
Congress
proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
QA76.9.A25 / C67 2017
005.8
Includes index.
Does Coupling Affect the Security of Masked Implementations? / Thomas De Cnudde, Begül Bilgin, Benedikt Gierlichs, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen -- Scaling Trends for Dual-Rail Logic Styles Against Side-Channel Attacks : A Case-Study / Kashif Nawaz, Dinal Kamel, François-Xavier Standaert, Denis Flandre -- Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks / Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht -- Toward More Efficient DPA-Resistant AES Hardware Architecture Based on Threshold Implementation / Rei Ueno, Naofumi Homma, Takafumi Aoki -- Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors / Jeremy Dubeuf, David Hely, Vincent Beroulle -- SafeDRP : Yet Another Way Toward Power-Equalized Designs in FPGA / Maik Ender, Alexander Wild, Amir Moradi -- On the Construction of Side-Channel Attack Resilient S-boxes / Liran Lerman, Nikita Veshchikov, Stjepan Picek, Olivier Markowitch -- Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices / Yoo-Seung Won, Dong-Guk Han -- Side-Channel Analysis of Keymill / Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Florian Mendel -- On the Easiness of Turning Higher-Order Leakages into First-Order / Thorben Moos, Amir Moradi -- Side-Channel Attacks Against the Human Brain : The PIN Code Case Study / Joseph Lange, Clément Massart, André Mouraux, Francois-Xavier Standaert -- Impacts of Technology Trends on Physical Attacks? / Philippe Maurine, Sylvain Guilley -- Low-Cost Setup for Localized Semi-invasive Optical Fault Injection Attacks / Oscar M. Guillen, Michael Gruber, Fabrizio De Santis -- DFA on LS-Designs with a Practical Implementation on SCREAM / Benjamin Lac, Anne Canteaut, Jacques Fournier, Renaud Sirdey -- Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors / Manami Suzuki, Rei Ueno, Naofumi Homma, Takafumi Aoki -- Getting the Most Out of Leakage Detection / Santos Merino del Pozo, François-Xavier Standaert -- Mind the Gap : Towards Secure 1st-Order Masking in Software / Kostas Papagiannopoulos, Nikita Veshchikov.
This book constitutes revised selected papers from the 8th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, held in Paris, France, in April 2017. The 17 papers presented in this volume were carefully reviewed and selected from numerous submissions. They were organized in topical sections named: Side-Channel Attacks and Technological Effects; Side-Channel Countermeasures; Algorithmic Aspects in Side-Channel Attacks; Side-Channel Attacks; Fault Attacks; Embedded Security; and Side-Channel Tools.
9783319646473 3319646478
10.1007/978-3-319-64647-3 doi
com.springer.onix.9783319646473 Springer Nature
GBB8N8190 bnb
019166611 Uk
Data encryption (Computer science)--Congresses.
Computer security--Congresses.
Chiffrement (Informatique)--Congrès.
Sécurité informatique--Congrès.
Coding theory & cryptology.
Information architecture.
Systems analysis & design.
Discrete mathematics.
Algorithms & data structures.
Computer security.
Computers--Security--General.
Business & Economics--Information Management.
Computers--Information Technology.
Computers--Data Processing.
Computers--Systems Architecture--General.
Computer architecture
Computer science
Computer science--Mathematics
Computer security
Data encryption (Computer science)
Management information systems
Microprogramming
Congress
proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
QA76.9.A25 / C67 2017
005.8